Wired's new Guide to Digital Security is an excellent addition to the genre of simple-to-follow how-tos for reducing the likelihood that you'll be victimized by computer-assisted crime and harassment, and that if you are, the harms will be mitigated.
Like Motherboard's guide, it is formatted as a series of short articles; like EFF's Surveillance Self Defense kit, it is structured around different kinds of threats, with separate paths for "civilians," "public figures" and "spies."
Some of the standout articles:
* Smartphone Security 101: The Steps That Matter Most in which Lily Hay Newman offers "quick and easy steps to make big improvements to your mobile security";
* How to Encrypt All of the Things, where Andy Greenberg shows you "how to keep snoopers out of every facet of your digital life, whether it's video chat or your PC's hard drive";
* How to Sweep For Bugs and Hidden Cameras, where Lily Hay Newman basically shows that unless you're really technologically sophisticated, this is very, very hard;
* and What to Do if You’re Being Doxed, where Newman interviews the Electronic Frontier Foundation's Eva Galperin for really practical advice on what could easily be a nightmare scenario.
Electronic security is a team sport: that's why the Cybersecurity Campaign Playbook has a chapter for how family members of political campaigners should armor themselves against being used as a means to get at their relatives.
This is the ideal season for you to help you up your family's security game. When you go home for the holidays, think about how you can install software, change defaults, and teach your family good practices to help you -- and them -- stay safe.
If this interests you, read EFF's Security Education Companion, which teaches you how to be an effective communicator of security precepts.
The WIRED Guide to Digital Security
It's been less than a year since a public-spirited hacker broke into the servers of Florida stalkerware vendor Retina-X, wiping out all the photos and data the company's customers had stolen from other peoples' phones (including their kids' phones) by installing the spying apps Phonesheriff on them.
A pair of researchers from Toronto's storied Citizen Lab (previously) have written an eye-opening editorial and call to action on the ways that repressive states have used the internet to attack dissidents, human rights advocates and political oppositions -- and how the information security community and tech companies have left these people vulnerable.
Radiflow reports that they discovered cryptojacking software -- malware that mines cryptocurrency -- running in the monitoring and control network of an unnamed European water utility, the first such discovery, and a point of serious concern about the security and integrity of critical infrastructure to both targeted and untargeted attacks.
When it comes to redesigning or renovating a living space, envisioning changes before they occur can be tricky for most. Thankfully, the web is home to tools that can remove some of the guesswork, like Live Home 3D Pro for Mac. This app lets you create detailed and furnished floor plans for everything from sheds and […]
For many startups and fledgling businesses, web hosting — and the fees associated with it — can take a sizeable chunk out of the company budget and limit growth down the road. But, that’s not to say there aren’t hosts out there who can get your site online while staying within your budget. Arch Hosting is a […]
The web is a big place, but it’s by no means infinite where domain names are concerned. New domain seekers, in particular, are feeling the burn as .com domain names become increasingly saturated, forcing many to choose a second-rate domain name or rename their brand entirely.Opting for a .tech domain not only affords you a […]